First, let the virus disappear from the directory
We start with the directory where the virus resides, and if the virus has a separate directory like normal software, then we can smile a little bit--the virus is weaker. When you check the directory's creation time, you can tell when you dyed the poison and you may fin
Are you still using someone else's encapsulated system? Are you still worried about the virus after the downloaded system?Still in order to install the new system, the installation of the software is not necessary for themselves?Worried about rogue software binding browser home page?Worried that all of your programming
In the computer configuration is not high on the machine, do not install anti-virus software will certainly be much higher efficiency. I do not have antivirus software for more than two years and there is no virus dye body reason. Frankly speaking is the user as the Internet! Instead of being an administrator. Let's say how to use the Internet in user mode.
1, after the installation of the
Recently, some time ago, the 8749 virus on the user's IE homepage was tampered with to generate a new variant, variant B, with more destructive power. This not only can end anti-virus software on the user's computer, you can even delete files related to some anti-virus software. As a result, the anti-virus software is
Disk drive Trojans have recently become a hot topic in the field of security, it is reported that since the March, "Disk machine" Trojan Horse has been updated several times, infection rate and destructive power is gradually increased. The virus after the operation to shut down and prevent 360 security guards and Kabbah, rising, Jinshan, Jiangmin and other security software operation, in addition to delete the sys
Because the running program is protected by Windows, viruses are often killed and cannot be deleted even if they are found. Antivirus software kills the virus how to do? It used to be recommended to kill in Safe mode or DOS mode. Now there is a new method called "Specify the debugger in the image File Execution option", and it should be possible to disinfect it in this way. The principle is to modify the registry, so that the
In general, viruses are hidden in the following three ways:
1, steal a single character change
2, the replacement system in the corresponding process name
3, the virus to run the required DLL file into the normal system process
Second, how to identify the virus process
1, the common
"C:windowssystem32clipsrv.exe". Double-click the "Alerter" service to find that its executable path is "C:windowssystem32svchost.exe-klocalservice" and the "Server" service has an executable path of "C: Windowssystem32svchost.exe-knetsvcs ". It is through this call, you can save a lot of system resources, so the system appears a number of svchost.exe, in fact, just sys
I. History of the Linux virusThe STAOG, which appeared in 1996, was the first virus under the Linux system, and it originated in an Australian organization called Vlad. Staog virus is written in assembly language, specifically infected with the binary files, and in three ways to try to get root permissions. Staog virus
>
Excerpt from: ClamAV virus scanner for Http://www.shangshuwu.cn/index.php/Linux security system
ClamAV is a typical anti-virus software with extensive and GPL-license open source code that supports a wide range of platforms, such as Windows, Linux, UNIX, and other applications, such as mail clients and servers, HTTP viru
, the anti-virus software manufacturer analyzes and studies the suspicious files provided by poisoned users through its virus monitoring network, and then adds the extracted feature strings to the "virus feature library, provide upgrade to users. Sometimes, because of payment, not every antivirus software can obtain a sample of the new
The form of computer virus and the way of transmission is becoming more and more diverse, network anti-virus work is no longer a simple single computer virus detection and removal, the need to establish multi-level, three-dimensional virus protection system, but also to have
Windows systems are integrated with countless tools that perform their respective duties to meet different application needs of users. In fact, these tools are "versatile". If you have enough imagination and are good at mining, you will find that they can also help us to counter viruses in addition to the industry.
I. The task manager gives a knife to the virus
Windows Task Manager is the main tool for you to manage processes. You can view the c
situation is the opposite, because this program is the system Idle process. What it means is that the CPU is 96% free, not 96%, and the more free it is, the lower the CPU usage of your computer (the reverse). And in fact the CPU usage of the system Idle process itself can be negligible. Some people would think of shutting down the process to reduce CPU usage, which is completely unnecessary and unworkable,
Windows systems are integrated with countless tools that perform their respective duties to meet different application needs of users. In fact, these tools are "versatile". If you have enough imagination and are good at mining, you will find that they can also help us to counter viruses in addition to the industry. I. The task manager gives a knife to the virus
Windows Task Manager is the main tool for you to manage processes. You can view the current
Format by many users is considered to deal with the "ultimate trump card" virus, no matter how you infected, I will be formatted after the system to reinstall, it is not a completely healthy system, this method despite some trouble, but many people think it is an effective poison coup. However, the recent emergence of a new type of u disk
The most terrible thing about surfing the internet is when new viruses come out. Although we have installed various powerful anti-virus software on our computers, we also configured regular and automatic updates to the virus database, however, the virus is always updated before the virus database, so the number of atta
the second copy of the file, I found that my u disk file name suffix has become an EXE, my plate poisoned, because this kind of thing for me is the first occurrence, feel more nervous, immediately with the rising kill poison, I am puzzled that, after killing the virus, U disk on the remaining documents, but the space has not changed, I think the file may be hidden, so I use the Folder options in the tool to display the file, but the file properties o
Windows systems are integrated with countless tools that perform their respective duties to meet different application needs of users. In fact, these tools are "versatile". If you have enough imagination and are good at mining, you will find that they can also help us to counter viruses in addition to the industry.
I. The task manager gives a knife to the virus
Windows Task Manager is the main tool for you to manage processes. You can view the current
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.